{"id":15867,"date":"2016-11-17T11:45:41","date_gmt":"2016-11-17T10:45:41","guid":{"rendered":"http:\/\/www.recantha.co.uk\/blog\/?p=15867"},"modified":"2016-11-18T10:05:28","modified_gmt":"2016-11-18T09:05:28","slug":"poisontap-is-a-raspberry-pi-zero-security-threat-worth-taking-note-of","status":"publish","type":"post","link":"https:\/\/www.recantha.co.uk\/blog\/?p=15867","title":{"rendered":"PoisonTap is a Raspberry Pi Zero security threat worth taking note of"},"content":{"rendered":"<p><a href=\"https:\/\/samy.pl\/poisontap\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15868\" src=\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?resize=560%2C280&#038;ssl=1\" alt=\"Poison Tap\" width=\"560\" height=\"280\" srcset=\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?w=674&amp;ssl=1 674w, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?resize=300%2C150&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?resize=560%2C280&amp;ssl=1 560w, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?resize=260%2C130&amp;ssl=1 260w, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?resize=160%2C80&amp;ssl=1 160w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p><em>I wasn&#8217;t going to blog this as it&#8217;s a pretty horrid use of the Pi, but I wanted to highlight the security concern!<\/em><\/p>\n<p>PoisonTap is a Raspberry Pi Zero\/Node.js hacking machine. According to the maker&#8217;s website, it:<\/p>\n<blockquote><p>siphons cookies, exposes internal router &amp; installs web backdoor on locked computers<\/p><\/blockquote>\n<p>It plugs into the USB port of a computer and first of all tricks the host computer into thinking that it&#8217;s connecting to a network and then it intercepts unencrypted web traffic. It also stores cookies coming from the web browser and tells the computer to be a router, thus making it accessible remotely. <strong>And it does all this without the machine being unlocked<\/strong>.<\/p>\n<p><a href=\"https:\/\/samy.pl\/poisontap\/\" target=\"_blank\">Read more about the PoisonTap by going to Samy Kamkar&#8217;s website<\/a>.<\/p>\n<p><i>It&#8217;s entirely up to you whether you try it out &#8211; just don&#8217;t blame me if you get in trouble!<\/i><\/p>\n<p>Dennis Fisher of On The Wire has interviewed Samy for his podcast &#8211; <a href=\"https:\/\/www.onthewire.io\/on-the-wire-podcast-samy-kamkar\/\" target=\"_blank\">listen here<\/a>.<\/p>\n<p>Here&#8217;s a live demo of it working:<\/p>\n<p><iframe loading=\"lazy\" title=\"PoisonTap - exploiting locked machines w\/Raspberry Pi Zero\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/Aatp5gCskvk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I wasn&#8217;t going to blog this as it&#8217;s a pretty horrid use of the Pi, but I wanted to highlight the security concern! PoisonTap is a Raspberry Pi Zero\/Node.js hacking machine. According to the maker&#8217;s website, it: siphons cookies, exposes&hellip;<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=15867\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[33,15,86,46],"tags":[],"class_list":["post-15867","post","type-post","status-publish","format-standard","hentry","category-networking","category-distros","category-raspberry-pi-zero","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PoisonTap is a Raspberry Pi Zero security threat worth taking note of - Raspberry Pi Pod<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=15867\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PoisonTap is a Raspberry Pi Zero security threat worth taking note of - Raspberry Pi Pod\" \/>\n<meta property=\"og:description\" content=\"I wasn&#8217;t going to blog this as it&#8217;s a pretty horrid use of the Pi, but I wanted to highlight the security concern! PoisonTap is a Raspberry Pi Zero\/Node.js hacking machine. According to the maker&#8217;s website, it: siphons cookies, exposes&hellip;Read more &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.recantha.co.uk\/blog\/?p=15867\" \/>\n<meta property=\"og:site_name\" content=\"Raspberry Pi Pod\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/recantha\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-17T10:45:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-18T09:05:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg\" \/>\n<meta name=\"author\" content=\"Michael Horne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@recantha\" \/>\n<meta name=\"twitter:site\" content=\"@recantha\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Horne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867\"},\"author\":{\"name\":\"Michael Horne\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263\"},\"headline\":\"PoisonTap is a Raspberry Pi Zero security threat worth taking note of\",\"datePublished\":\"2016-11-17T10:45:41+00:00\",\"dateModified\":\"2016-11-18T09:05:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867\"},\"wordCount\":196,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg\",\"articleSection\":[\"Networking\",\"Operating systems\",\"Raspberry Pi Zero\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.recantha.co.uk\/blog\/?p=15867#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867\",\"name\":\"PoisonTap is a Raspberry Pi Zero security threat worth taking note of - Raspberry Pi Pod\",\"isPartOf\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg\",\"datePublished\":\"2016-11-17T10:45:41+00:00\",\"dateModified\":\"2016-11-18T09:05:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.recantha.co.uk\/blog\/?p=15867\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?fit=674%2C337&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?fit=674%2C337&ssl=1\",\"width\":674,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=15867#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.recantha.co.uk\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PoisonTap is a Raspberry Pi Zero security threat worth taking note of\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/\",\"name\":\"Raspberry Pi Pod\",\"description\":\"Experiences with the Raspberry Pi micro computer and microcontroller\",\"publisher\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.recantha.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\",\"name\":\"Raspberry Pi Pod\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"width\":800,\"height\":337,\"caption\":\"Raspberry Pi Pod\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/recantha\/\",\"https:\/\/x.com\/recantha\",\"https:\/\/www.linkedin.com\/in\/recantha\/\",\"https:\/\/www.youtube.com\/channel\/UCK4F9blabxzmk8Inzhs8tpg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263\",\"name\":\"Michael Horne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"caption\":\"Michael Horne\"},\"url\":\"https:\/\/www.recantha.co.uk\/blog\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PoisonTap is a Raspberry Pi Zero security threat worth taking note of - Raspberry Pi Pod","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.recantha.co.uk\/blog\/?p=15867","og_locale":"en_US","og_type":"article","og_title":"PoisonTap is a Raspberry Pi Zero security threat worth taking note of - Raspberry Pi Pod","og_description":"I wasn&#8217;t going to blog this as it&#8217;s a pretty horrid use of the Pi, but I wanted to highlight the security concern! PoisonTap is a Raspberry Pi Zero\/Node.js hacking machine. According to the maker&#8217;s website, it: siphons cookies, exposes&hellip;Read more &rarr;","og_url":"https:\/\/www.recantha.co.uk\/blog\/?p=15867","og_site_name":"Raspberry Pi Pod","article_publisher":"https:\/\/www.facebook.com\/recantha\/","article_published_time":"2016-11-17T10:45:41+00:00","article_modified_time":"2016-11-18T09:05:28+00:00","og_image":[{"url":"https:\/\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg","type":"","width":"","height":""}],"author":"Michael Horne","twitter_card":"summary_large_image","twitter_creator":"@recantha","twitter_site":"@recantha","twitter_misc":{"Written by":"Michael Horne","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867#article","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867"},"author":{"name":"Michael Horne","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263"},"headline":"PoisonTap is a Raspberry Pi Zero security threat worth taking note of","datePublished":"2016-11-17T10:45:41+00:00","dateModified":"2016-11-18T09:05:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867"},"wordCount":196,"commentCount":0,"publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867#primaryimage"},"thumbnailUrl":"https:\/\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg","articleSection":["Networking","Operating systems","Raspberry Pi Zero","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.recantha.co.uk\/blog\/?p=15867#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867","url":"https:\/\/www.recantha.co.uk\/blog\/?p=15867","name":"PoisonTap is a Raspberry Pi Zero security threat worth taking note of - Raspberry Pi Pod","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867#primaryimage"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867#primaryimage"},"thumbnailUrl":"https:\/\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg","datePublished":"2016-11-17T10:45:41+00:00","dateModified":"2016-11-18T09:05:28+00:00","breadcrumb":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.recantha.co.uk\/blog\/?p=15867"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867#primaryimage","url":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?fit=674%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/11\/poisontap.jpeg?fit=674%2C337&ssl=1","width":674,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15867#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.recantha.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"PoisonTap is a Raspberry Pi Zero security threat worth taking note of"}]},{"@type":"WebSite","@id":"https:\/\/www.recantha.co.uk\/blog\/#website","url":"https:\/\/www.recantha.co.uk\/blog\/","name":"Raspberry Pi Pod","description":"Experiences with the Raspberry Pi micro computer and microcontroller","publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.recantha.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.recantha.co.uk\/blog\/#organization","name":"Raspberry Pi Pod","url":"https:\/\/www.recantha.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","width":800,"height":337,"caption":"Raspberry Pi Pod"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/recantha\/","https:\/\/x.com\/recantha","https:\/\/www.linkedin.com\/in\/recantha\/","https:\/\/www.youtube.com\/channel\/UCK4F9blabxzmk8Inzhs8tpg"]},{"@type":"Person","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263","name":"Michael Horne","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","caption":"Michael Horne"},"url":"https:\/\/www.recantha.co.uk\/blog\/?author=1"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2RsaV-47V","jetpack-related-posts":[{"id":13818,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=13818","url_meta":{"origin":15867,"position":0},"title":"Hardware hacker uses Raspberry Pi Zero as a selfie-stopper","author":"Michael Horne","date":"3 December 2015","format":false,"excerpt":"British security expect Steve Lord\u00a0has come up with a unique use for the Raspberry Pi Zero. Powered by batteries, the Zero seeks out open wifi networks and then scans network traffic for calls to Instagram, which is what most people use for selfies. The Pi then sends 'deauth' packets back\u2026","rel":"","context":"In &quot;Photography&quot;","block_context":{"text":"Photography","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=36"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/regmedia.co.uk\/2015\/12\/02\/selfie_876464r6.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":18928,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=18928","url_meta":{"origin":15867,"position":1},"title":"Raspberry Pi-powered, Google Calendar-aware clock with added NeoPixels","author":"Michael Horne","date":"12 June 2018","format":false,"excerpt":"Sam VanHook has created this lovely Google Calendar-aware clock out of some birch plywood and then added diffused Neopixels. These Neopixels are lit up by a Raspberry Pi Zero W when Sam has appointments in his Google Calendar. He's used a CNC router to cut the clock face (although I\u2026","rel":"","context":"In &quot;Blinkies&quot;","block_context":{"text":"Blinkies","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=80"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2018\/06\/cal-clock-800.png?fit=800%2C531&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2018\/06\/cal-clock-800.png?fit=800%2C531&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2018\/06\/cal-clock-800.png?fit=800%2C531&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2018\/06\/cal-clock-800.png?fit=800%2C531&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":18199,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=18199","url_meta":{"origin":15867,"position":2},"title":"Create an automatic failover\/switcher wifi hotspot on your Raspberry Pi","author":"Michael Horne","date":"14 February 2018","format":false,"excerpt":"Roboberry, over at Raspberry Connect, has documented a way to automatically create a wifi hotspot on your Pi if your wifi connection to your router fails, or if there is no router to connect to. This is a great idea because it means you can connect to your Pi 'on\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2018\/02\/wifihotspotfailover.jpg?fit=400%2C429&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":16193,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=16193","url_meta":{"origin":15867,"position":3},"title":"Build a motion-activated security camera with the Raspberry Pi Zero","author":"Michael Horne","date":"6 January 2017","format":false,"excerpt":"Mark West, a Brit now living in Norway, was convinced that he had some unwanted visitors in his garden. So, he decided to press into action a Raspberry Pi Zero as a security camera solution. He shopped at The Pi Hut\u00a0and got hold of the Zero, the Pi NoIR Camera\u2026","rel":"","context":"In &quot;Accessories&quot;","block_context":{"text":"Accessories","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=54"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/utbrudd.bouvet.no\/wp-content\/uploads\/2017\/01\/bollocks-e1483637804853-1024x768.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/utbrudd.bouvet.no\/wp-content\/uploads\/2017\/01\/bollocks-e1483637804853-1024x768.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/utbrudd.bouvet.no\/wp-content\/uploads\/2017\/01\/bollocks-e1483637804853-1024x768.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/utbrudd.bouvet.no\/wp-content\/uploads\/2017\/01\/bollocks-e1483637804853-1024x768.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":18119,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=18119","url_meta":{"origin":15867,"position":4},"title":"Make your wedding sparkle with these ESP8266 LED lamps controlled by a Raspberry Pi Zero","author":"Michael Horne","date":"20 January 2018","format":false,"excerpt":"Brian Lough\u00a0wanted to put his own stamp on his wedding. He admits his wife did most of the actual planning of the day, but Brian brought some electronics and wifi magic to the table centre decorations, pictured in action above. He used Ikea Grono lamps\u00a0as the main structure of each\u2026","rel":"","context":"In &quot;Accessories&quot;","block_context":{"text":"Accessories","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=54"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2018\/01\/weddinglights.gif?fit=462%2C260&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":17877,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=17877","url_meta":{"origin":15867,"position":5},"title":"Physical computing from a PC or Mac using a Raspberry Pi Zero","author":"Michael Horne","date":"4 December 2017","format":false,"excerpt":"Gordon Hollingworth, over at Raspberry Pi, has just blogged an exciting new development that means you can now use a Raspberry Pi Zero's GPIO pins from your PC or Mac. You'll need to install Raspbian x86 Stretch\u00a0on the non-Zero machine first. Now it\u00a0looks like you don't need an SD card\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/12\/IMG_20171127_164539-500x375.jpg?fit=500%2C375&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/15867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15867"}],"version-history":[{"count":2,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/15867\/revisions"}],"predecessor-version":[{"id":15881,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/15867\/revisions\/15881"}],"wp:attachment":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}